CVE-2026-42897

Microsoft · Exchange Server

A cross-site scripting (XSS) vulnerability in Microsoft Exchange Server allows unauthenticated attackers to perform spoofing over a network.

Executive summary

Microsoft Exchange Server is susceptible to an actively exploited cross-site scripting vulnerability that allows unauthenticated attackers to perform spoofing attacks.

Vulnerability

This is a cross-site scripting (XSS) vulnerability caused by improper input neutralization, which can be leveraged by an unauthenticated attacker to execute malicious scripts in the context of the victim's session.

Business impact

Successful exploitation allows attackers to spoof communications, potentially leading to phishing, credential theft, or unauthorized actions within the Exchange environment. The CVSS score of 8.1 and the confirmation of active exploitation classify this as a high-urgency issue.

Remediation

Immediate Action: Apply the latest vendor security updates immediately to mitigate the risk of active exploitation.

Proactive Monitoring: Monitor Exchange logs for suspicious web requests containing script tags or abnormal patterns targeting web-based interfaces.

Compensating Controls: Use a Web Application Firewall (WAF) to filter malicious input strings and block known XSS attack vectors targeting Exchange services.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to confirmed active exploitation, this CVE requires immediate attention. Security teams should prioritize patching all affected Microsoft Exchange instances to prevent potential spoofing and unauthorized access.